Monday, October 26, 2009

Lec 10 : Cyberlaws

In the chapter we learn about cyberlaw. Cyberspace is being governed by a system of law and regulation called Cyberlaw. There is no one exhaustive definition of the term “Cyberlaw”. Simply speaking, Cyberlaw is a generic term which refers to all the legal and regulatory aspects of Internet and the World Wide Web. Anything concerned with or related to or emanating from any legal aspects or issues concerning any activity of netizens and others, in Cyberspace comes within the ambit of Cyberlaw. The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory mechanisms which would further strengthen the legal infrastructure, so crucial to the success of Electronic Commerce.

Cyberlaw is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. Initially it may seem that Cyberlaws is a very technical field and that it does not have any bearing to most activities in Cyberspace. But the actual truth is that nothing could be further than the truth. Whether we realize it or not, every action and every reaction in Cyberspace has some legal and Cyber legal perspectives

Tuesday, October 20, 2009

Lec 9 : Legal and Ethical Issues in Computer Security

In this chapter we study controls applicable to computer security the legal system and ethics. The legal system has adapted quite well to computer technology by reusing some old forms of legal protection and creating laws where no adequate ones existed. Still, the courts are not a perfect form of protection for computer resources. This is, we have to wait for a transgression to occur and then adjudicate t, rather than try to prevent it n the first place. Second, fixing a problem through the courts can be time consuming and expensive, the latter characteristic prevents all but the wealthy form addressing most security issues.

On the other hand, ethics has not bad to change, because ethics is more situational and personal than the law. And although technically this issue is just an aspect of confidentiality, practically it has log history in both law and ethics. This chapter too discuss is round out study of protection for computing system by understanding the context in which security is assessed and applied. Not always are conflict resolved pleasantly. Some people will think that they have been treated unfairly, and some people do indeed act unfairly.

Law and computer security are related in several ways. First, international, federal,state,and city laws can affect privacy and secrecy. These statues often apply ti the rights of individuals to keep personal mattes private. Second, laws regulate the use, development and ownership of data and programs. Patents, copyrights and trade secrets are legal devices to protect the rights of developers and owners of programs and data. Similarly, one aspect of computer security id controlling access to programs and data that access control is support by the mechanisms.

Thursday, October 15, 2009

Lec 8: Wireless Security

The chapter 8 we learn about the wireless security.Wireless network specifications ware originally defined in IEEE's 802.11 standard.There are now a series of 802.11 standard, and various implementations of wireless network now occupy several more 802 standard. The original 802.11 standard contained several security measures, including
- Disable the services set identifier (SSID) broadcast
- MAC addressing filtering
- Wired Equivalent Privacy (WEP) authentication
- WEP data encryption

Security in 802.11 was found to be seriously flawed in several areas 802.11 was developed to correct the shortcomings of security in 802.11. The WiFi also improved security for wireless networks with WiFi protected Access (WPA, WPA2) for home network use, called personal, and for business network use, called Enterprise. WPA uses an acceptable encryption algorithm that is strong and easier on the devices performing the encryption. WPA2 uses a significantly stronger algorithm that is considered uncrackable, but the performence of devices may suffer with the heavy work load.

Thursday, October 1, 2009

Lab 7 : Security in Application

In lab 7 we learn about security in application. In the lab 7 mostly we learn about FTP. File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet.

As a user,can use FTP with a simple command line interface (for example, from the Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user interface. Your Web browser can also make FTP requests to download programs you select from a Web page. Using FTP, you can also update (delete, rename, move, and copy) files at a server. You need to logon to an FTP server. However, publicly available files are easily accessed using anonymous FTP.

Basic FTP support is usually provided as part of a suite of programs that come with TCP/IP. However, any FTP client program with a graphical user interface usually